CN103106519A - Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark - Google Patents

Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106519A
CN103106519A CN2013100232447A CN201310023244A CN103106519A CN 103106519 A CN103106519 A CN 103106519A CN 2013100232447 A CN2013100232447 A CN 2013100232447A CN 201310023244 A CN201310023244 A CN 201310023244A CN 103106519 A CN103106519 A CN 103106519A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100232447A
Other languages
Chinese (zh)
Inventor
曹鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100232447A priority Critical patent/CN103106519A/en
Publication of CN103106519A publication Critical patent/CN103106519A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

Disclosed is a multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark. The multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system anti-fake signal through polynary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multi-parametric-vardouble-layer double-layer gradient polynary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-parametric-vardouble-layer double-layer gradient polynary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100232447100002DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE003
Figure 2013100232447100002DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE005
Figure 2013100232447100002DEST_PATH_IMAGE006
Figure 2013100232447100002DEST_PATH_IMAGE008
With
Figure DEST_PATH_IMAGE009
, encryption parameter
Figure 481228DEST_PATH_IMAGE002
Figure 273735DEST_PATH_IMAGE003
Figure 928838DEST_PATH_IMAGE004
Figure 324047DEST_PATH_IMAGE005
Figure 13786DEST_PATH_IMAGE006
Figure 711614DEST_PATH_IMAGE007
Figure 854014DEST_PATH_IMAGE008
With
Figure 928280DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100232447100002DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
Figure 2013100232447100002DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
Figure 2013100232447100002DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 724723DEST_PATH_IMAGE010
Figure 593453DEST_PATH_IMAGE011
Figure 347782DEST_PATH_IMAGE012
Figure 960160DEST_PATH_IMAGE013
Figure 656480DEST_PATH_IMAGE016
Figure 806970DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 325807DEST_PATH_IMAGE010
Figure 536339DEST_PATH_IMAGE011
Figure 265261DEST_PATH_IMAGE012
Figure 219442DEST_PATH_IMAGE013
Figure 239798DEST_PATH_IMAGE015
Figure 42366DEST_PATH_IMAGE016
Figure 800237DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 28087DEST_PATH_IMAGE010
Figure 846002DEST_PATH_IMAGE011
Figure 283936DEST_PATH_IMAGE012
Figure 927855DEST_PATH_IMAGE014
Figure 717268DEST_PATH_IMAGE016
Figure 941576DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 878439DEST_PATH_IMAGE010
Figure 326049DEST_PATH_IMAGE012
Figure 354048DEST_PATH_IMAGE013
Figure 410997DEST_PATH_IMAGE014
Figure 251225DEST_PATH_IMAGE016
Figure 692702DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 869736DEST_PATH_IMAGE010
Figure 105677DEST_PATH_IMAGE011
Figure 368162DEST_PATH_IMAGE012
Figure 379291DEST_PATH_IMAGE014
Figure 535914DEST_PATH_IMAGE016
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 470821DEST_PATH_IMAGE010
Figure 314143DEST_PATH_IMAGE011
Figure 410275DEST_PATH_IMAGE012
Figure 997245DEST_PATH_IMAGE013
Figure 737799DEST_PATH_IMAGE014
Figure 752023DEST_PATH_IMAGE015
Figure 335451DEST_PATH_IMAGE016
Figure 460533DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 196539DEST_PATH_IMAGE010
Figure 506297DEST_PATH_IMAGE011
Figure 452388DEST_PATH_IMAGE012
Figure 404598DEST_PATH_IMAGE013
Figure 119744DEST_PATH_IMAGE014
Figure 475770DEST_PATH_IMAGE015
Figure 500675DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 597255DEST_PATH_IMAGE011
Figure 517938DEST_PATH_IMAGE012
Figure 913147DEST_PATH_IMAGE013
Figure 300714DEST_PATH_IMAGE015
Figure 443114DEST_PATH_IMAGE016
Figure 517380DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure DEST_PATH_IMAGE018
Figure 671412DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE019
Figure 681088DEST_PATH_IMAGE011
Figure 435417DEST_PATH_IMAGE018
Figure 47795DEST_PATH_IMAGE012
Figure 627123DEST_PATH_IMAGE018
Figure DEST_PATH_IMAGE021
Figure 623974DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE022
Figure 103628DEST_PATH_IMAGE017
Figure 57809DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure DEST_PATH_IMAGE023
Figure 431153DEST_PATH_IMAGE010
Figure 2013100232447100002DEST_PATH_IMAGE024
Figure 779537DEST_PATH_IMAGE023
Figure 765258DEST_PATH_IMAGE013
Figure 559735DEST_PATH_IMAGE023
Figure 873036DEST_PATH_IMAGE014
Figure 2013100232447100002DEST_PATH_IMAGE026
Figure 169019DEST_PATH_IMAGE015
Figure 516955DEST_PATH_IMAGE023
Figure 2013100232447100002DEST_PATH_IMAGE027
Figure 916155DEST_PATH_IMAGE017
Figure 15829DEST_PATH_IMAGE023
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100232447100002DEST_PATH_IMAGE028
Figure 2013100232447100002DEST_PATH_IMAGE029
Figure 128721DEST_PATH_IMAGE011
Figure 541248DEST_PATH_IMAGE028
Figure 179034DEST_PATH_IMAGE012
Figure 441967DEST_PATH_IMAGE028
Figure 217156DEST_PATH_IMAGE014
Figure 2013100232447100002DEST_PATH_IMAGE031
Figure 658633DEST_PATH_IMAGE015
Figure 570088DEST_PATH_IMAGE028
Figure 71608DEST_PATH_IMAGE016
Figure 2013100232447100002DEST_PATH_IMAGE032
Figure 209459DEST_PATH_IMAGE017
Figure 189048DEST_PATH_IMAGE028
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100232447100002DEST_PATH_IMAGE033
Figure 2013100232447100002DEST_PATH_IMAGE034
Figure 768376DEST_PATH_IMAGE011
Figure 377212DEST_PATH_IMAGE033
Figure 426070DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE035
Figure 187484DEST_PATH_IMAGE013
Figure 30806DEST_PATH_IMAGE033
Figure 2304DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE036
Figure 222499DEST_PATH_IMAGE015
Figure 353266DEST_PATH_IMAGE033
Figure 242856DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE037
Figure 577016DEST_PATH_IMAGE017
Figure 826732DEST_PATH_IMAGE033
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure DEST_PATH_IMAGE038
Figure 562738DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE039
Figure 623229DEST_PATH_IMAGE011
Figure 569320DEST_PATH_IMAGE038
Figure 622726DEST_PATH_IMAGE012
Figure 213239DEST_PATH_IMAGE013
Figure 569265DEST_PATH_IMAGE038
Figure 737072DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE041
Figure 469536DEST_PATH_IMAGE015
Figure 166752DEST_PATH_IMAGE038
Figure DEST_PATH_IMAGE042
Figure 614362DEST_PATH_IMAGE017
Figure 511036DEST_PATH_IMAGE038
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure DEST_PATH_IMAGE043
Figure DEST_PATH_IMAGE044
Figure 501264DEST_PATH_IMAGE011
Figure 996596DEST_PATH_IMAGE013
Figure 130905DEST_PATH_IMAGE043
Figure 619655DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE046
Figure 372979DEST_PATH_IMAGE015
Figure 771730DEST_PATH_IMAGE043
Figure 935995DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE047
Figure 928353DEST_PATH_IMAGE017
Figure 344422DEST_PATH_IMAGE043
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 597680DEST_PATH_IMAGE010
Figure 262404DEST_PATH_IMAGE048
Figure 353988DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE051
Figure 987226DEST_PATH_IMAGE015
Figure 215076DEST_PATH_IMAGE048
Figure 767411DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE052
Figure 956078DEST_PATH_IMAGE017
Figure 517641DEST_PATH_IMAGE048
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure DEST_PATH_IMAGE053
Figure 475364DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE054
Figure 464179DEST_PATH_IMAGE011
Figure 264776DEST_PATH_IMAGE053
Figure 364450DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE055
Figure 590330DEST_PATH_IMAGE013
Figure 750047DEST_PATH_IMAGE053
Figure DEST_PATH_IMAGE056
Figure 551092DEST_PATH_IMAGE015
Figure 608041DEST_PATH_IMAGE053
Figure 63293DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE057
Figure 713849DEST_PATH_IMAGE017
Figure 155325DEST_PATH_IMAGE053
, set encryption parameter
Figure 66781DEST_PATH_IMAGE002
Figure 692934DEST_PATH_IMAGE003
Figure 689840DEST_PATH_IMAGE004
Figure 935008DEST_PATH_IMAGE005
Figure 966549DEST_PATH_IMAGE006
Figure 123172DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE058
Carry out H1=
Figure 108784DEST_PATH_IMAGE010
Figure 52078DEST_PATH_IMAGE019
Figure 197068DEST_PATH_IMAGE059
Figure 390283DEST_PATH_IMAGE012
Figure 780944DEST_PATH_IMAGE020
Figure 641584DEST_PATH_IMAGE013
Figure 826709DEST_PATH_IMAGE059
Figure 507220DEST_PATH_IMAGE014
Figure 435993DEST_PATH_IMAGE021
Figure 151139DEST_PATH_IMAGE015
Figure 940552DEST_PATH_IMAGE016
Figure 367302DEST_PATH_IMAGE017
Figure 894230DEST_PATH_IMAGE059
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is rightCarry out H1=
Figure 819908DEST_PATH_IMAGE059
Figure 509647DEST_PATH_IMAGE010
Figure 332109DEST_PATH_IMAGE019
Figure 474509DEST_PATH_IMAGE011
Figure 424141DEST_PATH_IMAGE059
Figure 93020DEST_PATH_IMAGE012
Figure 961750DEST_PATH_IMAGE020
Figure 591446DEST_PATH_IMAGE013
Figure 469403DEST_PATH_IMAGE059
Figure 868154DEST_PATH_IMAGE014
Figure 32420DEST_PATH_IMAGE021
Figure 149411DEST_PATH_IMAGE015
Figure 565480DEST_PATH_IMAGE059
Figure 294850DEST_PATH_IMAGE022
Figure 633559DEST_PATH_IMAGE017
Figure 977952DEST_PATH_IMAGE059
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure DEST_PATH_IMAGE060
Figure 797020DEST_PATH_IMAGE010
Figure 444034DEST_PATH_IMAGE024
Figure 270038DEST_PATH_IMAGE011
Figure 27910DEST_PATH_IMAGE060
Figure 255760DEST_PATH_IMAGE012
Figure 73674DEST_PATH_IMAGE025
Figure 948538DEST_PATH_IMAGE060
Figure 30894DEST_PATH_IMAGE014
Figure 144344DEST_PATH_IMAGE026
Figure 944941DEST_PATH_IMAGE015
Figure 44615DEST_PATH_IMAGE060
Figure 247057DEST_PATH_IMAGE016
Figure 141195DEST_PATH_IMAGE027
Figure 542003DEST_PATH_IMAGE017
Figure 445368DEST_PATH_IMAGE060
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE061
Carry out H2=
Figure 88062DEST_PATH_IMAGE010
Figure 597672DEST_PATH_IMAGE024
Figure 364255DEST_PATH_IMAGE060
Figure 491873DEST_PATH_IMAGE012
Figure 733947DEST_PATH_IMAGE013
Figure 765488DEST_PATH_IMAGE060
Figure 437909DEST_PATH_IMAGE014
Figure 922111DEST_PATH_IMAGE026
Figure 705390DEST_PATH_IMAGE015
Figure 591438DEST_PATH_IMAGE060
Figure 60858DEST_PATH_IMAGE016
Figure 32357DEST_PATH_IMAGE027
Figure 619327DEST_PATH_IMAGE017
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure DEST_PATH_IMAGE062
Figure 124837DEST_PATH_IMAGE010
Figure 583631DEST_PATH_IMAGE029
Figure 974292DEST_PATH_IMAGE011
Figure 195451DEST_PATH_IMAGE062
Figure 505210DEST_PATH_IMAGE012
Figure 451300DEST_PATH_IMAGE030
Figure 380073DEST_PATH_IMAGE013
Figure 970586DEST_PATH_IMAGE062
Figure 303174DEST_PATH_IMAGE014
Figure 736561DEST_PATH_IMAGE031
Figure 491284DEST_PATH_IMAGE017
Figure 807121DEST_PATH_IMAGE062
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 504949DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 846249DEST_PATH_IMAGE003
Figure 16593DEST_PATH_IMAGE004
Figure 885323DEST_PATH_IMAGE005
Figure 515018DEST_PATH_IMAGE006
Figure 127396DEST_PATH_IMAGE007
WithInitial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by polynary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 948350DEST_PATH_IMAGE018
Figure 223474DEST_PATH_IMAGE010
Figure 243776DEST_PATH_IMAGE019
Figure 578942DEST_PATH_IMAGE011
Figure 183230DEST_PATH_IMAGE018
Figure 137410DEST_PATH_IMAGE012
Figure 510754DEST_PATH_IMAGE020
Figure 282401DEST_PATH_IMAGE013
Figure 108406DEST_PATH_IMAGE018
Figure 889715DEST_PATH_IMAGE014
Figure 117565DEST_PATH_IMAGE021
Figure 935479DEST_PATH_IMAGE015
Figure 373414DEST_PATH_IMAGE018
Figure 669397DEST_PATH_IMAGE016
Figure 892699DEST_PATH_IMAGE022
Figure 806746DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 906420DEST_PATH_IMAGE023
Figure 843283DEST_PATH_IMAGE010
Figure 3000DEST_PATH_IMAGE024
Figure 415527DEST_PATH_IMAGE011
Figure 318892DEST_PATH_IMAGE023
Figure 440880DEST_PATH_IMAGE025
Figure 216069DEST_PATH_IMAGE013
Figure 657546DEST_PATH_IMAGE023
Figure 959214DEST_PATH_IMAGE014
Figure 457640DEST_PATH_IMAGE015
Figure 702807DEST_PATH_IMAGE023
Figure 593403DEST_PATH_IMAGE016
Figure 265824DEST_PATH_IMAGE027
Figure 750026DEST_PATH_IMAGE017
Figure 798884DEST_PATH_IMAGE023
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 684932DEST_PATH_IMAGE028
Figure 528254DEST_PATH_IMAGE010
Figure 499752DEST_PATH_IMAGE029
Figure 827277DEST_PATH_IMAGE028
Figure 841500DEST_PATH_IMAGE012
Figure 300294DEST_PATH_IMAGE030
Figure 425376DEST_PATH_IMAGE013
Figure 286016DEST_PATH_IMAGE028
Figure 595775DEST_PATH_IMAGE014
Figure 541865DEST_PATH_IMAGE031
Figure 470638DEST_PATH_IMAGE015
Figure 37713DEST_PATH_IMAGE028
Figure 393739DEST_PATH_IMAGE016
Figure 686180DEST_PATH_IMAGE032
Figure 294010DEST_PATH_IMAGE017
Figure 988297DEST_PATH_IMAGE028
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 515224DEST_PATH_IMAGE033
Figure 435907DEST_PATH_IMAGE010
Figure 581848DEST_PATH_IMAGE034
Figure 6008DEST_PATH_IMAGE011
Figure 969416DEST_PATH_IMAGE033
Figure 111815DEST_PATH_IMAGE012
Figure 186081DEST_PATH_IMAGE035
Figure 464747DEST_PATH_IMAGE013
Figure 723690DEST_PATH_IMAGE033
Figure 353386DEST_PATH_IMAGE014
Figure 965764DEST_PATH_IMAGE036
Figure 364515DEST_PATH_IMAGE015
Figure 669726DEST_PATH_IMAGE033
Figure 937207DEST_PATH_IMAGE037
Figure 580678DEST_PATH_IMAGE017
Figure 791211DEST_PATH_IMAGE033
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 349679DEST_PATH_IMAGE010
Figure 598389DEST_PATH_IMAGE039
Figure 104457DEST_PATH_IMAGE011
Figure 196041DEST_PATH_IMAGE038
Figure 953912DEST_PATH_IMAGE012
Figure 181762DEST_PATH_IMAGE040
Figure 999677DEST_PATH_IMAGE013
Figure 437611DEST_PATH_IMAGE038
Figure 81531DEST_PATH_IMAGE041
Figure 628801DEST_PATH_IMAGE038
Figure 728476DEST_PATH_IMAGE016
Figure 55552DEST_PATH_IMAGE042
Figure 215269DEST_PATH_IMAGE017
Figure 503162DEST_PATH_IMAGE038
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 140948DEST_PATH_IMAGE043
Figure 322530DEST_PATH_IMAGE010
Figure 428338DEST_PATH_IMAGE011
Figure 282789DEST_PATH_IMAGE045
Figure 681038DEST_PATH_IMAGE014
Figure 837661DEST_PATH_IMAGE015
Figure 523299DEST_PATH_IMAGE016
Figure 366622DEST_PATH_IMAGE047
Figure 462754DEST_PATH_IMAGE017
Figure 784145DEST_PATH_IMAGE043
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 790278DEST_PATH_IMAGE048
Figure 804501DEST_PATH_IMAGE010
Figure 263296DEST_PATH_IMAGE049
Figure 513011DEST_PATH_IMAGE011
Figure 373651DEST_PATH_IMAGE048
Figure 558776DEST_PATH_IMAGE012
Figure 504866DEST_PATH_IMAGE050
Figure 433639DEST_PATH_IMAGE013
Figure 148786DEST_PATH_IMAGE048
Figure 629445DEST_PATH_IMAGE014
Figure 797253DEST_PATH_IMAGE051
Figure 529716DEST_PATH_IMAGE015
Figure 99369DEST_PATH_IMAGE048
Figure 750930DEST_PATH_IMAGE016
Figure 918751DEST_PATH_IMAGE017
Figure 342910DEST_PATH_IMAGE048
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 306318DEST_PATH_IMAGE053
Figure 573351DEST_PATH_IMAGE010
Figure 382039DEST_PATH_IMAGE054
Figure 926284DEST_PATH_IMAGE011
Figure 60593DEST_PATH_IMAGE053
Figure 424709DEST_PATH_IMAGE012
Figure 427300DEST_PATH_IMAGE055
Figure 826052DEST_PATH_IMAGE013
Figure 982675DEST_PATH_IMAGE014
Figure 398744DEST_PATH_IMAGE056
Figure 776635DEST_PATH_IMAGE015
Figure 252747DEST_PATH_IMAGE053
Figure 591456DEST_PATH_IMAGE016
Figure 184559DEST_PATH_IMAGE017
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 782211DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 540082DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 767933DEST_PATH_IMAGE058
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 758202DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multi-parametric-vardouble-layer double-layer gradient polynary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 675640DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 655098DEST_PATH_IMAGE002
Figure 497152DEST_PATH_IMAGE003
Figure 954678DEST_PATH_IMAGE004
Figure 831367DEST_PATH_IMAGE005
Figure 716146DEST_PATH_IMAGE006
Figure 45497DEST_PATH_IMAGE007
With
Figure 37909DEST_PATH_IMAGE009
, encryption parameter
Figure 93590DEST_PATH_IMAGE002
Figure 910236DEST_PATH_IMAGE003
Figure 709565DEST_PATH_IMAGE004
Figure 787428DEST_PATH_IMAGE006
Figure 91371DEST_PATH_IMAGE007
Figure 366494DEST_PATH_IMAGE008
With
Figure 72282DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 469765DEST_PATH_IMAGE010
Figure 261004DEST_PATH_IMAGE011
Figure 402135DEST_PATH_IMAGE012
Figure 796393DEST_PATH_IMAGE014
Figure 809349DEST_PATH_IMAGE015
Figure 754171DEST_PATH_IMAGE016
Figure 168972DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 173837DEST_PATH_IMAGE010
Figure 674088DEST_PATH_IMAGE011
Figure 691909DEST_PATH_IMAGE013
Figure 792906DEST_PATH_IMAGE015
Figure 203345DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 550012DEST_PATH_IMAGE010
Figure 24856DEST_PATH_IMAGE011
Figure 115172DEST_PATH_IMAGE012
Figure 359071DEST_PATH_IMAGE013
Figure 611061DEST_PATH_IMAGE014
Figure 635518DEST_PATH_IMAGE015
Figure 263945DEST_PATH_IMAGE016
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 988505DEST_PATH_IMAGE010
Figure 437940DEST_PATH_IMAGE011
Figure 870059DEST_PATH_IMAGE012
Figure 822971DEST_PATH_IMAGE013
Figure 353496DEST_PATH_IMAGE015
Figure 662303DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 692576DEST_PATH_IMAGE010
Figure 562629DEST_PATH_IMAGE012
Figure 490134DEST_PATH_IMAGE013
Figure 714745DEST_PATH_IMAGE014
Figure 422807DEST_PATH_IMAGE015
Figure 734840DEST_PATH_IMAGE016
Figure 782430DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 92189DEST_PATH_IMAGE010
Figure 225230DEST_PATH_IMAGE011
Figure 340954DEST_PATH_IMAGE012
Figure 786027DEST_PATH_IMAGE014
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 530681DEST_PATH_IMAGE010
Figure 638315DEST_PATH_IMAGE011
Figure 33524DEST_PATH_IMAGE012
Figure 644634DEST_PATH_IMAGE013
Figure 857309DEST_PATH_IMAGE014
Figure 248976DEST_PATH_IMAGE015
Figure 510193DEST_PATH_IMAGE016
Figure 38127DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 297070DEST_PATH_IMAGE010
Figure 113716DEST_PATH_IMAGE011
Figure 913045DEST_PATH_IMAGE012
Figure 498747DEST_PATH_IMAGE013
Figure 990908DEST_PATH_IMAGE014
Figure 29271DEST_PATH_IMAGE015
Figure 632291DEST_PATH_IMAGE016
Figure 338079DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 735562DEST_PATH_IMAGE010
Figure 526800DEST_PATH_IMAGE011
Figure 667932DEST_PATH_IMAGE012
Figure 228226DEST_PATH_IMAGE013
Figure 734294DEST_PATH_IMAGE014
Figure 75145DEST_PATH_IMAGE015
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 377317DEST_PATH_IMAGE018
Figure 877568DEST_PATH_IMAGE010
Figure 360502DEST_PATH_IMAGE019
Figure 793123DEST_PATH_IMAGE012
Figure 815809DEST_PATH_IMAGE018
Figure 863192DEST_PATH_IMAGE021
Figure 107091DEST_PATH_IMAGE015
Figure 624660DEST_PATH_IMAGE018
Figure 586800DEST_PATH_IMAGE016
Figure 152911DEST_PATH_IMAGE022
Figure 251317DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 412660DEST_PATH_IMAGE023
Figure 579200DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE024
Figure 860008DEST_PATH_IMAGE011
Figure 719380DEST_PATH_IMAGE023
Figure 390533DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE025
Figure 626342DEST_PATH_IMAGE013
Figure 761657DEST_PATH_IMAGE023
Figure 729613DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE026
Figure 950379DEST_PATH_IMAGE015
Figure 458720DEST_PATH_IMAGE023
Figure 651804DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE027
Figure 915295DEST_PATH_IMAGE017
Figure 561040DEST_PATH_IMAGE023
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 935390DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE029
Figure 355056DEST_PATH_IMAGE028
Figure 488097DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE030
Figure 728454DEST_PATH_IMAGE013
Figure 173528DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE031
Figure 590603DEST_PATH_IMAGE015
Figure 510017DEST_PATH_IMAGE028
Figure 266621DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE032
Figure 980499DEST_PATH_IMAGE017
Figure 88132DEST_PATH_IMAGE028
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure DEST_PATH_IMAGE033
Figure 607975DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE034
Figure 431761DEST_PATH_IMAGE033
Figure 761111DEST_PATH_IMAGE012
Figure 756749DEST_PATH_IMAGE035
Figure 746887DEST_PATH_IMAGE033
Figure 297954DEST_PATH_IMAGE014
Figure 425179DEST_PATH_IMAGE036
Figure 10881DEST_PATH_IMAGE015
Figure 237463DEST_PATH_IMAGE033
Figure 541406DEST_PATH_IMAGE016
Figure 393693DEST_PATH_IMAGE037
Figure 833902DEST_PATH_IMAGE017
Figure 496964DEST_PATH_IMAGE033
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 429334DEST_PATH_IMAGE010
Figure 989628DEST_PATH_IMAGE039
Figure 558013DEST_PATH_IMAGE011
Figure 774231DEST_PATH_IMAGE038
Figure 133854DEST_PATH_IMAGE040
Figure 873140DEST_PATH_IMAGE013
Figure 373391DEST_PATH_IMAGE038
Figure 121904DEST_PATH_IMAGE014
Figure 504661DEST_PATH_IMAGE015
Figure 492209DEST_PATH_IMAGE038
Figure 4164DEST_PATH_IMAGE042
Figure 350832DEST_PATH_IMAGE017
Figure 560096DEST_PATH_IMAGE038
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 349563DEST_PATH_IMAGE044
Figure 287804DEST_PATH_IMAGE012
Figure 976275DEST_PATH_IMAGE045
Figure 160131DEST_PATH_IMAGE013
Figure 592250DEST_PATH_IMAGE043
Figure 810741DEST_PATH_IMAGE014
Figure 278949DEST_PATH_IMAGE015
Figure 249179DEST_PATH_IMAGE043
Figure 322177DEST_PATH_IMAGE016
Figure 352450DEST_PATH_IMAGE047
Figure 510899DEST_PATH_IMAGE017
Figure 222503DEST_PATH_IMAGE043
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 996927DEST_PATH_IMAGE049
Figure 559812DEST_PATH_IMAGE048
Figure 931888DEST_PATH_IMAGE012
Figure 799350DEST_PATH_IMAGE050
Figure 915073DEST_PATH_IMAGE013
Figure 817170DEST_PATH_IMAGE048
Figure 360147DEST_PATH_IMAGE014
Figure 980484DEST_PATH_IMAGE051
Figure 594185DEST_PATH_IMAGE048
Figure 308063DEST_PATH_IMAGE016
Figure 150117DEST_PATH_IMAGE052
Figure 484333DEST_PATH_IMAGE048
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 306795DEST_PATH_IMAGE053
Figure 636145DEST_PATH_IMAGE010
Figure 897362DEST_PATH_IMAGE054
Figure 684239DEST_PATH_IMAGE053
Figure 438568DEST_PATH_IMAGE012
Figure 565793DEST_PATH_IMAGE055
Figure 89178DEST_PATH_IMAGE013
Figure 315760DEST_PATH_IMAGE053
Figure 32842DEST_PATH_IMAGE056
Figure 410733DEST_PATH_IMAGE015
Figure 73796DEST_PATH_IMAGE053
Figure 599455DEST_PATH_IMAGE016
Figure 6166DEST_PATH_IMAGE057
Figure 300881DEST_PATH_IMAGE017
Figure 72528DEST_PATH_IMAGE053
, set encryption parameter
Figure 85483DEST_PATH_IMAGE002
Figure 53743DEST_PATH_IMAGE003
Figure 468544DEST_PATH_IMAGE004
Figure 473409DEST_PATH_IMAGE005
Figure 911343DEST_PATH_IMAGE006
Figure 659857DEST_PATH_IMAGE007
With
Figure 104930DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 92478DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 316786DEST_PATH_IMAGE058
Carry out H1=
Figure 706179DEST_PATH_IMAGE059
Figure 787267DEST_PATH_IMAGE010
Figure 262111DEST_PATH_IMAGE019
Figure 414744DEST_PATH_IMAGE011
Figure 596326DEST_PATH_IMAGE059
Figure 113895DEST_PATH_IMAGE012
Figure 438883DEST_PATH_IMAGE013
Figure 802869DEST_PATH_IMAGE059
Figure 491339DEST_PATH_IMAGE014
Figure 612879DEST_PATH_IMAGE021
Figure 107314DEST_PATH_IMAGE015
Figure 325806DEST_PATH_IMAGE059
Figure 185177DEST_PATH_IMAGE016
Figure 856330DEST_PATH_IMAGE022
Figure 764243DEST_PATH_IMAGE017
Figure 837241DEST_PATH_IMAGE059
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 867514DEST_PATH_IMAGE058
Carry out H1=
Figure 25963DEST_PATH_IMAGE059
Figure 799884DEST_PATH_IMAGE010
Figure 665072DEST_PATH_IMAGE019
Figure 866246DEST_PATH_IMAGE011
Figure 511991DEST_PATH_IMAGE059
Figure 89603DEST_PATH_IMAGE012
Figure 871614DEST_PATH_IMAGE020
Figure 181373DEST_PATH_IMAGE013
Figure 314414DEST_PATH_IMAGE059
Figure 492454DEST_PATH_IMAGE014
Figure 332234DEST_PATH_IMAGE021
Figure 875211DEST_PATH_IMAGE015
Figure 149384DEST_PATH_IMAGE016
Figure 843670DEST_PATH_IMAGE022
Figure 823127DEST_PATH_IMAGE017
Figure 665181DEST_PATH_IMAGE059
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 122708DEST_PATH_IMAGE060
Figure 999397DEST_PATH_IMAGE010
Figure 821859DEST_PATH_IMAGE024
Figure 151209DEST_PATH_IMAGE011
Figure 412426DEST_PATH_IMAGE060
Figure 143622DEST_PATH_IMAGE012
Figure 199303DEST_PATH_IMAGE025
Figure 140583DEST_PATH_IMAGE013
Figure 2228DEST_PATH_IMAGE060
Figure 587931DEST_PATH_IMAGE014
Figure 321717DEST_PATH_IMAGE015
Figure 659158DEST_PATH_IMAGE060
Figure 364946DEST_PATH_IMAGE016
Figure 553667DEST_PATH_IMAGE017
Figure 632482DEST_PATH_IMAGE060
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 192776DEST_PATH_IMAGE061
Carry out H2=
Figure 26740DEST_PATH_IMAGE060
Figure 39695DEST_PATH_IMAGE010
Figure 984518DEST_PATH_IMAGE024
Figure 337002DEST_PATH_IMAGE011
Figure 341867DEST_PATH_IMAGE060
Figure 842118DEST_PATH_IMAGE012
Figure 387369DEST_PATH_IMAGE025
Figure 922255DEST_PATH_IMAGE013
Figure 333315DEST_PATH_IMAGE026
Figure 803796DEST_PATH_IMAGE060
Figure 216323DEST_PATH_IMAGE016
Figure 306639DEST_PATH_IMAGE027
Figure 550538DEST_PATH_IMAGE017
Figure 802528DEST_PATH_IMAGE060
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 764668DEST_PATH_IMAGE062
Figure 330779DEST_PATH_IMAGE010
Figure 694764DEST_PATH_IMAGE029
Figure 117655DEST_PATH_IMAGE011
Figure 567091DEST_PATH_IMAGE062
Figure 999209DEST_PATH_IMAGE012
Figure 811493DEST_PATH_IMAGE013
Figure 482646DEST_PATH_IMAGE062
Figure 656138DEST_PATH_IMAGE014
Figure 759410DEST_PATH_IMAGE015
Figure 917858DEST_PATH_IMAGE062
Figure 691779DEST_PATH_IMAGE016
Figure 556967DEST_PATH_IMAGE032
Figure 403886DEST_PATH_IMAGE062
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100232447A 2013-01-22 2013-01-22 Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark Pending CN103106519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100232447A CN103106519A (en) 2013-01-22 2013-01-22 Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100232447A CN103106519A (en) 2013-01-22 2013-01-22 Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106519A true CN103106519A (en) 2013-05-15

Family

ID=48314365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100232447A Pending CN103106519A (en) 2013-01-22 2013-01-22 Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106519A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, article "2.AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515